Home Page Icon
Home Page
Table of Contents for
Bibliography
Close
Bibliography
by John Day
Patterns in Network Architecture
Copyright
Dedication
Preface
The Seven Unanswered Questions
Converging on TCP
Acknowledgments
About the Author
1. Foundations for Network Architecture
Introduction
Beginning at the Beginning
Levels of Abstraction
Model
Service
Protocol and Interface
Implementation
Specifying Protocols
Informal Specifications
Formal Description Techniques
Where to from Here
2. Protocol Elements
Introduction
Protocol Architecture
Elements of a Protocol
Protocol
Associations, Connections, Flows, and Bindings
Interfaces
Data Units
Headers
Trailers
The Nature of the Service Boundary
Stream Versus Record
Constructing Protocol
The Size of PDUs
Mechanism and Policy
QoS Versus NoS
A Short Catalog of Data Transfer Mechanisms
Delimiting
Initial State Synchronization
Policy Selection
Addressing
Flow or Connection Identifier
Relaying
Multiplexing
Ordering
Fragmentation/Reassembly
Combining/Separation
Data Corruption
Lost and Duplicate Detection
Flow Control
Retransmission Control or Acknowledgment
Compression
Authentication
Access Control
Integrity
Confidentiality
Nonrepudiation
Activity
Phases of Operation
The Enrollment Phase
The Establishment or Synchronization Phase
The Data Transfer Phase
Conclusions
3. Patterns in Protocols
Introduction
The Two Major Architecture Paradigms
The Layered Model
The Beads-on-a-String Model
The Connectionless/Connection Debate
Background
Finding for a Synthesis: The Easy Part
The Types of Mechanisms
How Many PDUs in a Protocol?
The Types of Protocols
The Architecture of Data Transfer PMs
Finding a Synthesis: The Hard Part
Conclusions
4. Stalking the Upper-Layer Architecture
Introduction
A Bit of History
The Upper Layer(s) of the ARPANET
Early Elegance: Telnet, FTP, and RJE
What Was Learned
The OSI Attempt or “Green Side Up”
Session, Presentation, and Application
What Was Learned
Network Management
HTTP and the Web
Directory- or Name-Resolution Protocols
Name-Resolution Systems
NRS Structures
What Distinguishes the Upper Layers
Semantic Significance
Location Independence
Conclusions
5. Naming and Addressing
Introduction
Why Do We Need Naming and Addressing?
How the Problem Arose
Background on Naming and Addressing
Foundations of Mathematics and Naming
Naming and Addressing in Telephony
Naming in Operating Systems
X.25 and the ITU
The Evolution of Addressing in the Internet: Early IP
OSI and NSAPs
Addressing in IPv6
The Various Address Types
IPv6 Unicast Addresses
Looking Back over IPv6
“Upper-Layer” or Application Addressing in OSI
URI, URL, URN, and So On: Upper-Layer Addressing in the Internet
Conclusions
6. Divining Layers
Introduction
Putting Protocols Together
What We Have Seen
Listening to the Problem
Introduction
Communications Within a Single System
The Operation of Communication in a Single System
Properties of Major Elements
Definitions of the Initial Elements
Communications Between Two Systems
The Operation of Communication Between Two Systems
Invalidated Assumptions
New Elements Required
Simultaneous Communications Between Two Systems
Operation of Simultaneous Communications
Multiple Pairs of Applications Communicating
Multiple Instances of the EFCP
Managing the Single Resource
New Elements Required
Communications with N Systems
Operation of Communications with N Systems
New Elements
Communication with N Systems on the Cheap
Operation of Communication with N Systems on the Cheap
New Elements
Initial Conclusions
Taking Stock
The Network IPC Architecture (NIPCA)
Organizing Layers
Conclusions
7. The Network IPC Model
Introduction
Basic Structure
Definitions
Description of the Basic System
Processing Systems and Their Operating Systems in Brief
Basic Structures and Their Principles
The Structure of Applications and Protocols
Application Protocol Machines
Naming Concepts for (N)-DIFs and Applications
Definitions
Application Naming
The (N)-Distributed IPC Facility
Definitions
The (N)-IPC-Process
The (N)-IPC-APM
The IPC API
The EFCP Protocol
Delimiting
The IPC Data Transfer PM
The IPC Control Protocol
Relaying and Multiplexing Task (RMT)
PDU Protection
The IPC Management Task
(N)-IPC-Access-Protocol (IAP)
Resource Information Exchange Protocol (RIEP)
Resource Information Base
The IPC Management Task
Network Management Protocol and Management Architecture
The Nature of Layers
Operation of the DIF
Adding a New Member to an (N)-DIF
Creating a New DIF
Data Transfer
Identifiers in an (N)-DIF
The (N)-Port-ID
Application Process Names
(N)-Addresses
Taking Stock
IPC Facilities
IPC Structures
Multiple (N)-DIFs of the Same Rank
Implications for Security
Conclusions
8. Making Addresses Topological
Introduction
General Properties of Addressing
Names and Addresses
Introducing Topology to Addressing
Definitions
Topologies for Addressing
The Role of Hierarchy in Addressing
The Hierarchy of Layers
The Hierarchical Topology of Address Spaces
The Hierarchy of Networks
Melding Address Spaces and the Hierarchy of Layers
Hierarchical Addressing Architecture
Single-Layer Address Topology
Single-Layer Hierarchical Address Topology
Address Topology for a Hierarchy of Layers
Addressing Topologies for Multiple Hierarchies of Layers
Modeling the Public Internet
Conclusions
9. Multihoming, Multicast, and Mobility
Introduction
Multihoming
Multicast Architecture
Introduction to the Multicast Problem
The Multicast Model
Multicast “Addressing”
Multicast Distribution
Sentential Naming Operations and Their Resolution
Multicast Distribution in a Recursive Architecture
Multiplexing Multicast Groups
Reliable Multicast
Mobility
Mobility in IP and Cellular Networks
Mobility in NIPCA
Ad Hoc Mobile Networking
Mobile Application Processes
Conclusions
10. Backing Out of a Blind Alley
Introduction
Consolidation and the Next Generation
How Did This Happen?
The Importance of Theory
Finding a New Path
The High Points
A. Outline for Gedanken Experiment on Separating Mechanism and Policy
Part I Service Definitions
Part II Protocol Specifications
Part III Mechanism Specifications
Bibliography
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
A. Outline for Gedanken Experiment on Separating Mechanism and Policy
Next
Next Chapter
Appendix . Bibliography
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset